Amazon Linux 2 : kernel (ALASKERNEL-5.10-2024-059)

medium Nessus Plugin ID 200362

Synopsis

The remote Amazon Linux 2 host is missing a security update.

Description

The version of kernel installed on the remote host is prior to 5.10.176-157.645. It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2KERNEL-5.10-2024-059 advisory.

In the Linux kernel, the following vulnerability has been resolved:

ext4: block range must be validated before use in ext4_mb_clear_bb() (CVE-2022-50021)

An issue was discovered in arch/x86/kvm/vmx/nested.c in the Linux kernel before 6.2.8. nVMX on x86_64 lacks consistency checks for CR0 and CR4. (CVE-2023-30456)

In the Linux kernel, the following vulnerability has been resolved:

ftrace: Fix invalid address access in lookup_rec() when index is 0 (CVE-2023-53075)

In the Linux kernel, the following vulnerability has been resolved:

drm/shmem-helper: Remove another errant put in error path (CVE-2023-53084)

In the Linux kernel, the following vulnerability has been resolved:

drm/i915/active: Fix misuse of non-idle barriers as fence trackers (CVE-2023-53087)

In the Linux kernel, the following vulnerability has been resolved:

ext4: fix task hung in ext4_xattr_delete_inode (CVE-2023-53089)

In the Linux kernel, the following vulnerability has been resolved:

interconnect: fix mem leak when freeing nodes (CVE-2023-53096)

In the Linux kernel, the following vulnerability has been resolved:

ext4: fix WARNING in ext4_update_inline_data (CVE-2023-53100)

In the Linux kernel, the following vulnerability has been resolved:

ext4: zero i_disksize when initializing the bootloader inode (CVE-2023-53101)

In the Linux kernel, the following vulnerability has been resolved:

net: tunnels: annotate lockless accesses to dev->needed_headroom (CVE-2023-53109)

In the Linux kernel, the following vulnerability has been resolved:

i40e: Fix kernel crash during reboot when adapter is in recovery mode (CVE-2023-53114)

In the Linux kernel, the following vulnerability has been resolved:

nvmet: avoid potential UAF in nvmet_req_complete() (CVE-2023-53116)

In the Linux kernel, the following vulnerability has been resolved:

fs: prevent out-of-bounds array speculation when closing a file descriptor (CVE-2023-53117)

In the Linux kernel, the following vulnerability has been resolved:

tcp: tcp_make_synack() can be called from process context (CVE-2023-53121)

In the Linux kernel, the following vulnerability has been resolved:

scsi: mpt3sas: Fix NULL pointer access in mpt3sas_transport_port_add() (CVE-2023-53124)

In the Linux kernel, the following vulnerability has been resolved:

net: usb: smsc75xx: Limit packet length to skb->len (CVE-2023-53125)

In the Linux kernel, the following vulnerability has been resolved:

SUNRPC: Fix a server shutdown leak (CVE-2023-53131)

In the Linux kernel, the following vulnerability has been resolved:

bnxt_en: Avoid order-5 memory allocation for TPA data (CVE-2023-53134)

In the Linux kernel, the following vulnerability has been resolved:

ext4: Fix possible corruption when moving a directory (CVE-2023-53137)

In the Linux kernel, the following vulnerability has been resolved:

scsi: core: Remove the /proc/scsi/${proc_name} directory earlier (CVE-2023-53140)

In the Linux kernel, the following vulnerability has been resolved:

ila: do not generate empty messages in ila_xlat_nl_cmd_get_mapping() (CVE-2023-53141)

In the Linux kernel, the following vulnerability has been resolved:

ext4: fix another off-by-one fsmap error on 1k block filesystems (CVE-2023-53143)

Tenable has extracted the preceding description block directly from the tested product security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Run 'yum update kernel' to update your system.

See Also

https://alas.aws.amazon.com//AL2/ALAS2KERNEL-5.10-2024-059.html

https://alas.aws.amazon.com/faqs.html

https://explore.alas.aws.amazon.com/CVE-2022-50021.html

https://explore.alas.aws.amazon.com/CVE-2023-30456.html

https://explore.alas.aws.amazon.com/CVE-2023-53075.html

https://explore.alas.aws.amazon.com/CVE-2023-53084.html

https://explore.alas.aws.amazon.com/CVE-2023-53087.html

https://explore.alas.aws.amazon.com/CVE-2023-53089.html

https://explore.alas.aws.amazon.com/CVE-2023-53096.html

https://explore.alas.aws.amazon.com/CVE-2023-53100.html

https://explore.alas.aws.amazon.com/CVE-2023-53101.html

https://explore.alas.aws.amazon.com/CVE-2023-53109.html

https://explore.alas.aws.amazon.com/CVE-2023-53114.html

https://explore.alas.aws.amazon.com/CVE-2023-53116.html

https://explore.alas.aws.amazon.com/CVE-2023-53117.html

https://explore.alas.aws.amazon.com/CVE-2023-53121.html

https://explore.alas.aws.amazon.com/CVE-2023-53124.html

https://explore.alas.aws.amazon.com/CVE-2023-53125.html

https://explore.alas.aws.amazon.com/CVE-2023-53131.html

https://explore.alas.aws.amazon.com/CVE-2023-53134.html

https://explore.alas.aws.amazon.com/CVE-2023-53137.html

https://explore.alas.aws.amazon.com/CVE-2023-53140.html

https://explore.alas.aws.amazon.com/CVE-2023-53141.html

https://explore.alas.aws.amazon.com/CVE-2023-53143.html

Plugin Details

Severity: Medium

ID: 200362

File Name: al2_ALASKERNEL-5_10-2024-059.nasl

Version: 1.5

Type: local

Agent: unix

Published: 6/11/2024

Updated: 8/4/2025

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.2

CVSS v2

Risk Factor: Medium

Base Score: 4.6

Temporal Score: 3.4

Vector: CVSS2#AV:L/AC:L/Au:S/C:N/I:N/A:C

CVSS Score Source: CVE-2023-30456

CVSS v3

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 5.7

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:amazon:linux:perf, p-cpe:/a:amazon:linux:bpftool, p-cpe:/a:amazon:linux:perf-debuginfo, p-cpe:/a:amazon:linux:kernel-tools-debuginfo, p-cpe:/a:amazon:linux:kernel-debuginfo-common-aarch64, p-cpe:/a:amazon:linux:kernel-tools, p-cpe:/a:amazon:linux:kernel-devel, p-cpe:/a:amazon:linux:python-perf-debuginfo, p-cpe:/a:amazon:linux:kernel-livepatch-5.10.176-157.645, p-cpe:/a:amazon:linux:kernel, p-cpe:/a:amazon:linux:kernel-debuginfo, p-cpe:/a:amazon:linux:kernel-headers, cpe:/o:amazon:linux:2, p-cpe:/a:amazon:linux:bpftool-debuginfo, p-cpe:/a:amazon:linux:kernel-tools-devel, p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64, p-cpe:/a:amazon:linux:python-perf

Required KB Items: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 6/6/2024

Vulnerability Publication Date: 4/10/2023

Reference Information

CVE: CVE-2022-50021, CVE-2023-30456, CVE-2023-53075, CVE-2023-53084, CVE-2023-53087, CVE-2023-53089, CVE-2023-53096, CVE-2023-53100, CVE-2023-53101, CVE-2023-53109, CVE-2023-53114, CVE-2023-53116, CVE-2023-53117, CVE-2023-53121, CVE-2023-53124, CVE-2023-53125, CVE-2023-53131, CVE-2023-53134, CVE-2023-53137, CVE-2023-53140, CVE-2023-53141, CVE-2023-53143